Meta plans to prevent disinformation and AI-generated content from influencing voters
Meta, the company that owns some of the biggest social networks in use today, has explained how it means to tackle disinformation related to the upcoming EU Parliament …
How Ducktail capitalizes on compromised business, ad accounts
Quite some money can be made from selling compromised business and ad accounts on social media platforms, and the Ducktail threat actor has specialized in just that. “We …
Photos: Infosecurity Europe 2023
Infosecurity Europe 2023 is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The second gallery is available here. Here’s a closer …
HackerOne updates Internet Bug Bounty program to improve the security of open source software
HackerOne announced the next evolution of the Internet Bug Bounty (IBB) program at the company’s annual Security conference. The IBB’s mission is to secure open source by …
Enterprise networks vulnerable to 20-year-old exploits
Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. While exotic attacks and nation-states such as Russia and …
DataStax K8ssandra now available on any Kubernetes environment
DataStax announced that K8ssandra, an open-source distribution of Apache Cassandra on Kubernetes, is available on any Kubernetes environment including distro-specific …
Fleeceware apps extract hundreds of dollars per year from their users through subscription services
Avast has discovered more than 200 new fleeceware applications on the Apple App Store and the Google PlayStore. The apps have been downloaded approximately one billion times …
TikTok chooses Oracle as secure cloud technology provider
Oracle announced that it was chosen to become TikTok‘s secure cloud technology provider. This technical decision by TikTok was heavily influenced by Zoom’s recent …
Featured news
Sponsored
Don't miss
- Beware of phishing emails delivering backdoored Linux VMs!
- Google patches actively exploited Android vulnerability (CVE-2024-43093)
- Open-source software: A first attempt at organization after CRA
- Maximizing security visibility on a budget
- Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)